Federal agencies now only have one more day to patch React2Shell bug

The amount of time federal agencies have to patch the recent React2Shell vulnerability has decreased significantly. 

The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-55182 — a vulnerability impacting a popular open-source tool built into thousands of widely used digital products — to its Known Exploited Vulnerabilities catalog late last week, giving federal agencies until December 26 to patch the bug.

The date is now  Friday. A spokesperson for CISA confirmed the date change and noted that CISA wanted federal agencies to “check for signs of potential compromise on all internet accessible REACT instances after applying mitigations.”

CISA’s patch deadlines are often an indicator of a bug’s severity for the industry in general. React2Shell affects React Server Components, a tool originally created for Facebook and now embedded in 50 million websites and products built by countless major companies.

Since December 3, cybersecurity defenders have scrambled to patch CVE-2025-55182 due to the wide use of React Server Components. 

Over the last week, defenders have seen government-backed hackers from China and North Korea exploiting the bug alongside an array of cybercriminal groups. 

Palo Alto Networks’ Unit 42 published a new advisory on Wednesday evening showing more than 50 organizations have been impacted by breaches sourced back to CVE-2025-55182. 

The impacted organizations are in the U.S. as well as Asia, South America and the Middle East. Hackers are targeting financial services institutions, higher education, the tech industry, all levels of government and media organizations. 

Unit 42 added that in addition to previously identified Chinese malware strains like Snowlight and Vshell, they are now seeing other malware used including NoodlerRat, XMRIG, BPFDoor, Autocolor, Mirai and Supershell. 

Justin Moore, a senior official at Unit 42, told Recorded Future News that researchers have confirmed cases where attackers used CVE-2025-55182 to breach networks.

“We have observed opportunistic targeting and automated scripts for the installation of cryptominers and botnets, targeting AWS configuration keys, and more targeted installation of numerous robust backdoors previously associated with nation state affiliated actors,” Moore said. 

Unit 42 also confirmed previous reporting by cybersecurity firm Sysdig that North Korean hackers are exploiting the bug to deliver malware and facilitate cryptocurrency theft. 

Unit 42 added that it observed some hackers exploiting the bug using BPFDoor, a Linux backdoor attributed to a China-linked threat group known as Red Menshen.

The group was previously accused of targeting the telecommunications, finance and retail sectors, with attacks observed in South Korea, Hong Kong, Myanmar, Malaysia and Egypt. Unit 42 tracked several other backdoors and strains of malware used in attacks. 

Other incident responders said they are now seeing low-skill, opportunistic abuse of the vulnerability across a variety of sectors. 

Christiaan Beek, senior director of threat intelligence at Rapid7, said the company is witnessing cryptocurrency miners and Mirai botnet deployments exploiting the bug. He added that there are indicators linking the vulnerability’s exploitation to tooling previously used by ransomware groups.

Researchers at CyCognito shared data that showed media organizations had an inordinate amount of externally exposed assets running vulnerable React Server Components affected by CVE-2025-55182. 

The company said news outlets, broadcast television stations, cable and satellite companies and more were exposed, likely because most media organizations use React in their frontend stacks. 

“They rely heavily on server-rendered frameworks such as Next.js to run public entry points like homepages, article and video pages, section fronts, search results and campaign microsites,” the company told Recorded Future News. 

“In many of these applications, React Server Components are used for server side data fetching, layout composition and streaming partial page updates. That puts the vulnerable react-server-dom-* packages directly in the request path on exposed web assets.”

The company also found the manufacturing, technology and hospitality industries as having significant exposure to CVE-2025-55182.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Hackers reportedly breach developer involved with Russia’s military draft database

Related Posts

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group's expansion to the country beyond Southeast Asia and South America. The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it tracks as Jewelbug, which it said overlaps with
Read More

New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct reconnaissance and execute arbitrary commands on compromised hosts. "Threat actors leveraged compromised credentials that mapped to both Cisco VPN and an over-privileged Active Directory account named, 'serviceaccount,'" eSentire said in a technical report published
Read More